Mahmoud Salmasizadeh
Mahmoud Salmasizadeh
Associate Professor Electronics Research Institute, Sharif University of Technology
Verified email at - Homepage
Cited by
Cited by
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
T Eisenbarth, T Kasper, A Moradi, C Paar, M Salmasizadeh, ...
Annual International Cryptology Conference, 203-220, 2008
A generalized method of differential fault attack against AES cryptosystem
A Moradi, MTM Shalmani, M Salmasizadeh
International Workshop on Cryptographic Hardware and Embedded Systems, 91-100, 2006
Desynchronization attack on RAPP ultralightweight authentication protocol
Z Ahmadian, M Salmasizadeh, MR Aref
Information processing letters 113 (7), 205-209, 2013
Fast correlation attacks on the summation generator
JD Golic, M Salmasizadeh, E Dawson
Journal of cryptology 13 (2), 245-262, 2000
A comparative study of mutual information analysis under a gaussian assumption
A Moradi, N Mousavi, C Paar, M Salmasizadeh
International Workshop on Information Security Applications, 193-205, 2009
Recursive linear and differential cryptanalysis of ultralightweight authentication protocols
Z Ahmadian, M Salmasizadeh, MR Aref
IEEE Transactions on Information Forensics and Security 8 (7), 1140-1151, 2013
A provably secure short transitive signature scheme from bilinear group pairs
SF Shahandashti, M Salmasizadeh, J Mohajeri
International Conference on Security in Communication Networks, 60-76, 2004
A key-policy attribute-based temporary keyword search scheme for secure cloud storage
MH Ameri, M Delavar, J Mohajeri, M Salmasizadeh
IEEE Transactions on Cloud Computing 8 (3), 660-671, 2018
Biclique cryptanalysis of the full-round KLEIN block cipher
Z Ahmadian, M Salmasizadeh, MR Aref
IET Information Security 9 (5), 294-301, 2015
A secure and efficient authentication technique for vehicular ad-hoc networks
MR Asaar, M Salmasizadeh, W Susilo, A Majidi
IEEE Transactions on Vehicular Technology 67 (6), 5409-5423, 2018
Dual-rail transition logic: A logic style for counteracting power analysis attacks
A Moradi, MTM Shalmani, M Salmasizadeh
Computers & Electrical Engineering 35 (2), 359-369, 2009
A secure and low-energy logic style using charge recovery approach
M Khatir, A Moradi, A Ejlali, MT Manzuri Shalmani, M Salmasizadeh
Proceedings of the 2008 international symposium on Low Power Electronics …, 2008
Physical Cryptanalysis of KeeLoq Code Hopping Applications.
T Eisenbarth, T Kasper, A Moradi, C Paar, M Salmasizadeh, ...
IACR Cryptol. ePrint Arch. 2008, 58, 2008
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN.
Z Ahmadian, S Rasoolzadeh, M Salmasizadeh, MR Aref
IACR Cryptol. ePrint Arch. 2015, 40, 2015
Charge recovery logic as a side channel attack countermeasure
A Moradi, M Khatir, M Salmasizadeh, MTM Shalmani
2009 10th International Symposium on Quality Electronic Design, 686-691, 2009
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle.
E Khoshhalpour, HR Shahriari
ISeCure 10 (1), 2018
Total break of Zorro using linear and differential attacks
S Rasoolzadeh, Z Ahmadian, M Salmasizadeh, MR Aref
The ISC International Journal of Information Security 6 (1), 23-34, 2014
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles.
A Moradi, T Eisenbarth, A Poschmann, C Rolfes, C Paar, MTM Shalmani, ...
IACR Cryptol. ePrint Arch. 2008, 188, 2008
A short ID‐based proxy signature scheme
MR Asaar, M Salmasizadeh, W Susilo
International Journal of Communication Systems 29 (5), 859-873, 2016
Power analysis attacks on MDPL and DRSL implementations
A Moradi, M Salmasizadeh, MTM Shalmani
International Conference on Information Security and Cryptology, 259-272, 2007
The system can't perform the operation now. Try again later.
Articles 1–20